BEC Lecture 4 Flashcards
Name and briefly describe the five major components that make up the information technology of an organization.
- Hardware: Hardware is the actual physical computer or computer peripheral device.
- Software: Software is the systems and programs that process data and turn that data into information.
- Network: A network is made up of the communication media that allows multiple computers to share data and information simultaneously.
- People: Many people have a role in IT, such as hardware technicians, network administrators, software developers, and end users.
- Data: Data is raw facts.
What are the five functions performed on data in a business information system?
The five functions performed on data are:
- Collect
- Process
- Store
- Transform
- Distribute
Describe the normal series of events in an accounting information system (AIS).
The series of events in an AIS is as follows:
- The transaction data from source documents is entered into the AIS by an end user.
- The original paper source document is filed.
- The transactions are recorded in the appropriate journal.
- The transactions are posted to the general and subsidiary ledgers.
- Trial balances are prepared.
- Adjustments, accruals and corrections are entered.
- Financial reports are generated.
Name the briefly describe six different types of MIS reports.
- Periodic Scheduled Reports: The traditional reports that display information in a predefined format and are made available on a regular basis to end users of the system.
- Exception Reports: Reports produced when a specific condition or “exception” occurs.
- Demand Reports: Specific reports that can be printed on demand.
- Ad Hoc Reports: A report that does not currently exist but that can be created on demand without having to get a software developer involved.
- Push Reports: A report that can actually be “pushed” or sent to a computer screen or computer desktop.
- Dashboard Reports: A report used by a company to present summary information necessary for management action.
What are the primary roles of business information systems?
The primary roles of business information systems are to:
- Process detailed data.
- Assist in making daily decisions.
- Assist in developing business strategies.
- Take orders from customers.
Name the five functions performed on data by a business information system.
The five functions performed on data in a business information system are:
- Collect
- Process
- Store
- Transform
- Distribute
Describe two types of processing used in a computerized environment.
Batch processing–periodic processing
Online, real time (OLRT) processing (often referred to as “online processing”)–immediate processing
What is a batch control total and how does it differ from a hash total?
A batch control total (or batch total) is a manually calculated total that is compared to a computer-generated total as a means of testing the accuracy and completeness of the input and processing. Batch totals are used for numbers that are normally added, such as dollar amounts. Hash totals are used for numbers that are not normally added, such as account numbers.
What is the distinction between centralized and decentralized (distributed) processing?
Centralized processing maintains data and performs data processing at one or more central locations. Decentralized processing occurs when computing power and processing are spread over many locations.
What are the advantages and disadvantages of centralized processing?
Advantages of Centralized Processing
- Data is secured better, once received.
- Processing is consistent.
Disadvantages of Centralized Processing
- The cost of transmitting large numbers of detailed transactions can be high.
- There are increased processing power and data storage needs at the central location.
- There is a reduction in local accountability.
- Input/output bottlenecks may occur at high traffic times.
- There may be a lack of ability to respond in a timely manner to information requests from remote locations.
- The entire organization may be vulnerable to problems incurred at a single location.
List and explain the steps in batch processing.
Batch processing is accomplished in two steps:
- Create a Transaction File: The first step is to create the transaction file by manually (usually) keying the data (data entry), editing the data for completeness and accuracy, and making the necessary corrections.
- Update the Master File: The second step is to update the master file by sorting the transaction file into the same order as the master file and then updating the relevant records in the master file from the transaction file.
What is the major distinction between batch processing and online processing?
The major distinction between batch processing and online processing is that transactions in a batch processing system are processed in batches and not necessarily at the time those transactions are submitted. In online processing, transactions are processed as the transactions are entered.
What are the various categories of business information systems?
The categories of business information systems are:
- Transaction processing systems
- Decisions support systems
- Management information systems
- Executive information systems
Identify functions that should be segregated in an IT department.
The duties of systems analysts, computer programmers, and computer operators should be segregated (although many companies combine systems analysts and computer programmers).
What are three types of programmed controls?
Programmed controls are:
- Input controls
- Processing controls
- Output controls
What are the six steps of the system development life cycle (SDLC)?
- Systems analysis
- Conceptual and physical design
- Implementation and conversion
- Training
- Testing
- Operations and maintenance
What is the objective of executive information systems (EIS)?
Executive information systems (executive support systems) provide senior executives with immediate and easy access to internal and external information to assist executives in monitoring business conditions. EIS assist in strategic, not daily, decision making.
What is the decision support system (DSS)?
A decision support system is a computer-based information system that provides interactive support for managers during the decision-making process. A DSS is useful for developing information directed toward making particular decisions.
What are transaction processing systems?
Transaction processing systems are the systems that process and record the routine, daily transactions necessary to conduct business.
What is the objective of management information systems (MIS)?
The objective of MIS is to provide managerial and other end users with reports. These predefined management reports provide managers with the information they need to assist them in the business decision-making process.
What are the five focus areas of the COBIT framework?
- Strategic alignment
- Value delivery
- Resource management
- Risk management
- Performance measurement
What are information criteria described by COBIT? [Remember the ICE RACE]
- Integrity
- Confidentiality
- Efficiency
- Reliability
- Availability
- Compliance
- Effectiveness
Identify the four domains and related process of the COBIT framework.
The four domains and related processes of COBIT are:
- Plan and Organize (Direct)
- Acquire and Implement (Solution)
- Deliver and Support (Service)
- Monitor and Evaluate (Ensure direction followed)
Why is it important to have segregation of duties between computer operators and computer programmers?
It is important that computer operators’ and computer programmers’ duties be segregated because a person performing both functions would have opportunity to make unauthorized and undetected program changes.
Why is it important to safeguard files and records?
Safeguarding of files and records is important because inadequate protection may result in loss or damage that might drive an organization out of business; hardware can always be replaced, but data often cannot be.
What is encryption?
Encryption involves using a password or a digital key to scramble a readable (plaintext) message into an unreadable (ciphertext message). The intended recipient of the message then uses either the same or another digital key (depending on the encryption method) to convert the ciphertext message back into plaintext.